Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 17 May, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

AT&T Cybersecurity Insights Report: Securing the Edge

Global study adds important context to edge use cases as well as how organisations are securing the network edge

by Guru Writer
January 25, 2022
in Featured
AT&T Cybersecurity Insights Report: Securing the Edge
Share on FacebookShare on Twitter

The 11th annual AT&T Cybersecurity Insights Report has been released today. Entitled Securing the Edge, it contains important insight into how organisations globally are architecting and securing edge initiatives, as well as some guidance on security essentials at the edge.

 

“We are seeing organisations moving away from centralised computing models to decentralised ones, like edge, and this has meant operations are transitioning from “lights on” monolithic applications to “thing enabled” computing experiences that are fully democratised. This has significant security implications, one major one being that a proactive security stance will best serve those that are innovating at the edge,” the report said.

 

When it comes to perceived cyberthreats at the edge, more than two-thirds of respondents rated the likelihood of compromise and the impact of compromise a four on a scale of one to five (highest). Ransomware and sniffing attacks are top attack concerns across all segments.

 

To secure the edge, the top cybersecurity controls organisations would deploy consisted of Intrusion/threat detection, device authentication and data leakage monitoring, with SASE and Zero Trust approaches leading depending on the use case.  Perhaps surprisingly, when it comes to edge environments – patching, which is typically touted as one of the most important security controls, ranked the lowest. Though the report cautions: “Many stakeholders in 5G and edge are using open source software, a known target for attackers. But because the software is embedded, dependencies aren’t always apparent. As a result, enterprises may want to prioritise the design of a clear process for receiving notifications about vulnerabilities or patches.

 

“Patching isn’t always an option. But when patching is an option, stakeholders should patch software in the infrastructure as quickly as possible. Yet they won’t always know the threat source, especially of zero-day attacks. The reality of this situation may be one reason why patching is the lowest ranked control.”

 

Though edge may mean different things to different organisations, it is here to stay and in some cases, much further along than one might think. It will likely take on a hybrid network model that requires a mix of traditional and next-gen security controls and because of the number of access points, devices, sensors and data on distributed networks, a shared responsibility model will be more important than ever before.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Has that password been compromised?

Next Post

Belarus Hacktivists launch ransomware on Railway

Recent News

Armis: Top Performer in Asset Visibility and Real-Time Detection in MITRE Engenuity ATT&CK® Evaluations for Industrial Control Systems (ICS)

Armis Launches new ‘Critical Infrastructure Protection Program’

May 17, 2022
jigsaw

Thanos and Jigsaw ransomware linked to 55 year old doctor

May 17, 2022
Google logo

Italian police thwart Eurovision cyberattack

May 17, 2022
nuclear power stack

UK announces nuclear cybersecurity strategy

May 16, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information